Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems

被引:0
|
作者
Jetter, Oliver [1 ]
Dinger, Jochen [1 ]
Hartenstein, Hannes [1 ]
机构
[1] Karlsruhe Inst Technol KIT, Inst Telemat, Karlsruhe, Germany
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current peer-to-peer (P2P) systems are vulnerable to a variety of attacks due to the lack of a central authorization authority. The Sybil attack, i.e., the forging of multiple identities, is crucial as it can enable an attacker to control a substantial fraction or even the entire P2P system. However, the correlation between the resources available to an attacker and the resulting influence on the P2P system has yet not been studied in detail. The contributions of our paper are twofold: i) we present an approach for assessing the actual threats of Sybil attacks and ii) we propose a distributed approach to limit the impact of Sybil attacks effectively. Therefore, we conduct a thorough analysis of the Sybil attack w.r.t. the resource requirements to operate Sybil nodes and we investigate the quantitative influence of Sybil nodes on the overall system. Our study focuses on Kademlia, a very popular distributed hash table (DHT) which is for instance used in BitTorrent. We ran extensive Internet measurements within the BitTorrent DHT to determine the actual required resources to operate nodes. To evaluate the quantitative influence of Sybil nodes, we additionally conducted a comprehensive simulation study. The results show that upstream network bandwidth is the dominating factor concerning resources. Furthermore, we illustrate that small portions of Sybil nodes are tolerable in terms of global system stability. Finally, we propose a new approach called RACING to improve the resistance of DHTs against Sybil attacks. By establishing a new distributed identity registration procedure based on IP addresses, we are able to effectively limit the number of Sybil nodes.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Securing peer-to-peer overlay networks from Sybil attack
    Lua, Eng Keong
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1213 - 1218
  • [2] Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets
    Wang, Tian-Zuo
    Wang, Huai-Min
    Liu, Bo
    Ding, Bo
    Zhang, Jing
    Shi, Pei-Chang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2731 - 2749
  • [3] Ethereum's Peer-to-Peer Network Monitoring and Sybil Attack Prevention
    Eisenbarth, Jean-Philippe
    Cholez, Thibault
    Perrin, Olivier
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (04)
  • [4] Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention
    Jean-Philippe Eisenbarth
    Thibault Cholez
    Olivier Perrin
    Journal of Network and Systems Management, 2022, 30
  • [5] Mitigating Peer-to-Peer Botnets by Sybil attacks
    Zhou Hangxia
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 241 - 243
  • [6] A Sybil-Resilient Peer-to-Peer Network Protocol
    Xu Xiang
    Zhou Hangxia
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 682 - 685
  • [7] Novel Sybil Defense Scheme for Peer-to-peer Applications
    Shamieh, Fuad
    Alharbi, Roa
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [8] Defeating against sybil-attacks in peer-to-peer networks
    Xiang, Xu
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1218 - 1222
  • [9] Defending Against sybil-attacks in Peer-to-Peer Networks
    Xu Xiang
    Lu Huijuan
    Chen Lianna
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 329 - 340
  • [10] Peer to peer sybil and eclipse attack detection via fuzzy kademlia
    Geepthi, D.
    Columbus, C. Christopher
    Jeyanthi, C.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (04) : 6925 - 6937